bt5使用方法
文件大小: 15389k
源码售价: 10 个金币 积分规则     积分充值
资源说明:bt5中文使用教程 第一章. 文档管理 ......................................................................................................................... 8 第二章. BackTrack 介绍 ............................................................................................................ 10 0 o/ v' e( c! i: N; H: }5 W 第一节. backtrack发展简介 ............................................................................................... 10 第二节. 同类系统介绍 ........................................................................................................ 14 第三节. 下载BackTrack ..................................................................................................... 18 6 C: m) g _9 s" c/ R; V 第三章. BackTrack 安装 ............................................................................................................ 21 5 {) F( C. }# _6 X# K9 G7 j2 E3 B 第一节. 光盘启动 ................................................................................................................ 21 第二节. 硬盘安装 ................................................................................................................ 25 第三节. U盘安装1——UNetbootin ................................................................................... 33 3 G6 q: E, P( | 第四节. U盘安装2——Linux Live USB creator ............................................................... 35 & K( d+ ?4 Z- z6 k! N5 g1 p; m 第五节. U盘安装3——Persistent ...................................................................................... 37 第六节. 升级安装最新版 .................................................................................................... 43 " j1 |# M2 }! ? 第七节. 更换桌面背景 ........................................................................................................ 45 & L4 C+ w/ G% m1 a5 M. z- ]; z' E 第八节. 从ubuntu到 BackTrack ........................................................................................ 47 # O! t( c5 l4 ?+ _ 第四章. ARM平台安装 ............................................................................................................. 47 " K, w* x5 p/ A5 G [ ^3 K 第一节. ARM介绍 .............................................................................................................. 47 第二节. Nokia N900安装backtrack ................................................................................... 48 第三节. motorala手机安装 backtrack ................................................................................ 52 + X' w% H: v% L- b7 O7 f4 h: Z! Y 第四节. 索爱Xperia X10手机安装 backtrack ................................................................... 53 6 H5 R9 g: m8 i# ?0 I 第五节. Motorola Xoom平板电脑安装 backtrack ............................................................ 57 : a0 G0 ?, ` X7 E( { 第五章. Backtrack虚拟化 .......................................................................................................... 61 第一节. VMware安装 backtrack ........................................................................................ 61 第二节. 自动安装Vmware Tools ....................................................................................... 65 第三节. 手动安装Vmware Tools ....................................................................................... 69 ) D% O/ G! T1 c! m0 e 第四节. BackTrack 安装 VMware Workstation .................................................................. 72 - f9 P' s& q0 B& s 第五节. Backtrack安装 Virtual Box ................................................................................... 73 y+ {% o: r) J8 h7 z9 F/ p 第六节. Virtual Box 安装BackTrack ................................................................................. 74 ! X2 b4 k e0 @& x t! `4 ^4 p 第六章. BackTrack上网 ............................................................................................................ 76 & e" R; ~! w- Y- I6 \- ] { 第一节. 自动获取 IP ........................................................................................................... 76 8 G0 P; H2 D; Q! g$ k# l% I7 X 第二节. 临时设置 IP地址 .................................................................................................. 79 8 d, A9 m3 R4 w5 B 第三节. 设置静态 IP地址 .................................................................................................. 79 第四节. ADSL拨号设置 .................................................................................................... 82 # M; ]6 _$ s2 [/ v 第五节. 无线网络设置 ........................................................................................................ 87 第七章. BackTrack 汉化 ............................................................................................................ 91 1 W8 R0 h+ M" {; b( v 第一节. BackTrack KDE汉化 ........................................................................................... 91 ) r7 P- |( y5 X1 h! w$ h3 p; r 第二节. BackTrack GNOME汉化 ..................................................................................... 96 第三节. 系统语言环境设置 .............................................................................................. 101 _3 l9 E5 W5 |% H3 D7 @$ w 第四节. 安装中文输入法 .................................................................................................. 102 9 V7 s! D o5 t3 q 第五节. 云输入法 .............................................................................................................. 104 F* q) c' r/ u- k0 i* L 第六节. 更新Firefox版本 ................................................................................................ 104 第八章. Linux基础 .................................................................................................................. 106 # X1 |- w7 K& a' S 第一节. 常用的apt命令 ................................................................................................... 106 V ?) [" B" U$ N5 Y# m! ~% o 第二节. 常用的dpkg命令 ................................................................................................ 107 7 ^' L& A" d2 x, b4 [ 第三节. 如何查找帮助 ...................................................................................................... 108 第九章. BackTrack基本使用 .................................................................................................. 108 第一节. 更改root密码 ..................................................................................................... 108 第二节. 创建普通用户 ...................................................................................................... 109 第三节. Backtrack 5 KDE更改屏幕分辨率 .................................................................... 111 ! A* A# w: ~5 C; P 第四节. Backtrack 5 GNOME更改屏幕分辨率 .............................................................. 113 " M3 D9 v) Q5 z- m6 } 第五节. 解决GPG错误 .................................................................................................... 115 第六节. 解决启动不了图形界面的问题 .......................................................................... 115 第七节. BackTrack 安装 QQ ............................................................................................ 116 2 Z7 C0 ^; w' c1 H 第八节. Rebuilding the bt4 ISO ...................................................................................... 117 * e" V# j7 J' @0 t* z6 ^ 第九节. Rebuilding the BT5 ISO ...................................................................................... 122 第十节. 更改桌面文件夹 .................................................................................................. 122 第十一节. 准备内核头文件 .................................................................................................. 123 $ k% v+ u/ Y8 l4 Y8 z# b 第十二节. 更新backtrack ..................................................................................................... 126 % y) t5 r# f6 l/ A N$ j& Q, x 第十章. Information Gathering信息搜集工具 ........................................................................ 128 ( ], F# D5 d9 `$ i/ k+ V% i7 K 第一节. Network analysis- DNS analysis .......................................................................... 128 , }+ C0 F% P% l* C2 X' u 1. DNSWalk .................................................................................................................... 128 2. DNSTracer .................................................................................................................. 129 5 @* c0 [+ p5 @1 x/ j 3. DNSEnum ................................................................................................................... 129 1 A% E- T1 l: u 第二节. Network analysis- Identify live hosts................................................................... 131 1. 0trace ........................................................................................................................... 131 1 t- v) ^/ y ? 2. Fping ........................................................................................................................... 131 第三节. Network analysis- Route analysis ....................................................................... 132 * n$ t* L4 z" `" e# _' ^# }! s 1. Netenum ...................................................................................................................... 132 ! I& Q8 O- C- W- z; Y- R, o 2. Protos .......................................................................................................................... 133 3 Z3 B* U) X2 @! I* A4 \ 第四节. Network analysis- Network scanners ................................................................... 134 4 c- C' c, c4 Z) J 1. Autoscan...................................................................................................................... 134 2. NMAP ......................................................................................................................... 138 8 P0 T. q$ K& `* V, c, T 3. Zenmap........................................................................................................................ 138 ' [* K6 _- O6 B9 s2 {( M 4. Unicornscan ................................................................................................................ 139 5 R: i5 q% `+ c1 M3 W 第五节. Network analysis- SSL Analysis .......................................................................... 141 1. Sslscan ......................................................................................................................... 141 0 x5 @ v V7 N% G 第十一章. Vulnerability Assessment漏洞检测工具 ................................................................... 144 第1节. Network assessment ............................................................................................. 144 + P K" f8 s) C2 E7 d! Q7 H$ M! R3 s 1. Cisco auditing tool ...................................................................................................... 144 + z7 H. W7 a& q, V, A8 ]2 I 2. Cisco global exploiter ................................................................................................. 144 8 Z. N5 z. L# q 3. Cisco OCS mass scanner............................................................................................. 145 % j' P6 p o7 k1 Y* W9 Z 4. Cisco password scanner .............................................................................................. 145 & l- x3 J$ G' G8 Y& b. ^ 5. Copy router config ...................................................................................................... 145 4 c+ [4 R2 K& m: b; ~- K/ {" C3 t 6. Merge router config..................................................................................................... 145 / w6 l' h8 e/ S# u @ j1 M8 K: s8 K1 j 第2节. Vulnerability Scanners漏洞扫描工具 ................................................................ 145 # [8 l6 f& t5 E0 \4 S 1. Nessus ......................................................................................................................... 145 2. OpenVas ...................................................................................................................... 149 , a ~. ^% ~- o% o 第十二章. Exploitation Tools漏洞利用工具 .............................................................................. 157 第一节. Network exploitation tools ................................................................................... 157 第二节. Wireless exploitation tools ................................................................................... 158 # Q5 p3 V: d3 s7 m& D 1. WEP密码pojie ........................................................................................................... 158 2. WPA密码pojie(WPA TKIP PSK) ......................................................................... 159 * b6 \; j0 C% h. s" t 3. WPA 2 密码pojie(WPA CCMP PSK) .................................................................... 159 8 ?# ?2 J5 ^9 [ 第三节. Social engineering tools ....................................................................................... 163 第十三章. Privilege Escalation权限提升 .................................................................................... 163 第1节. Sniffer ................................................................................................................... 163 1. ettercap ........................................................................................................................ 163 1 S* V" Q3 y# S0 x' _$ d% g. z 第2节. BackTrack 启用 Cuda .......................................................................................... 166 第十四章. Maintaining Access维护访问工具 ............................................................................ 169 第十五章. Reverse engineering逆向工程工具 ........................................................................... 170 ; m$ h5 G( x; T, D4 J; E 第十六章. RFID工具 ................................................................................................................... 170 J# P& W7 S( u! c" c 第十七章. Stress Testing压力测试工具 ...................................................................................... 171 第十八章. Forensics取证工具..................................................................................................... 171 # B3 @% q2 e2 @6 m 4 C7 C$ c) e: a: y 第1节. 取证应用 .............................................................................................................. 171 第十九章. Reporting Tools报告工具 .......................................................................................... 173 2 ?* [/ a/ J9 p+ x. r 第二十章. Services各种服务 ...................................................................................................... 174 第一节. 启动SSHD服务 .................................................................................................. 174 第二节. 启动VNC服务 ................................................................................................... 174 $ l1 C h$ I2 O0 F8 Y 第三节. 启动TFTP服务................................................................................................... 174 3 J8 z7 L$ K/ @7 I 第四节. 启动其他服务 ...................................................................................................... 174 4 m4 T- ?6 }( s, F- e1 ?! }$ A 第二十一章. Miscellaneous杂项工具 ...................................................................................... 175 : P$ @0 i! V- y 第二十二章. 常见的问题 .......................................................................................................... 176
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。